位置:成果数据库 > 期刊 > 期刊详情页
云存储完整性验证密码学技术研究进展
  • 时间:0
  • 分类:TP309.2[自动化与计算机技术—计算机系统结构;自动化与计算机技术—计算机科学与技术]
  • 作者机构:[1]桂林电子科技大学计算机与信息安全学院,桂林中国541004, [2]新加坡管理大学信息系统学院 新加坡178902, [3]北京航空航天大学电子信息工程学院,北京中国100191
  • 相关基金:国家自然科学基金(Nos.61672083,61370190,61272501,61402029,61472429,61202465,61532021)资助
中文摘要:

云存储完整性验证技术允许用户将数据存储至云端服务器,并为用户提供可验证的完整性保证。典型的云存储完整性验证方案由两个阶段组成:一是数据处理阶段,用户使用私钥处理数据、生成可验证的元数据存储于云服务器,而本地只需保存与数据相关的一些参数,如密钥和数据标签等;二是数据完整性验证阶段,验证者通过和云服务器交互执行一个挑战/证明协议,能够以极高的概率判断出云端数据当前的完整性。到目前为止,已经涌现了大量的相关密码学方案。本文对可证明安全的可公开验证的云存储完整性验证关键密码学技术研究进展进行简要回顾,主要涵盖代理数据外包技术、代理完整性验证技术、基于身份的数据外包技术以及几种计算和通信效率优化技术等。

英文摘要:

Data integrity checking schemes allow users to outsource data to a cloud server, with a guarantee that the in- tegrity of outsourced data can be verified. A typical data integrity checking scheme consists of two phases. In the data pro- cessing phase, the data owner processes her data with a private key to generate verifiable metadata that will be stored at the cloud server, and only keeps at local some related parameters including keys and data labels. In the data integrity checking phase, the verifier interacts with the cloud server to jointly carry out a challenge/prove protocol, which can detect the cur- rent integrity state of outsourced data with overwhelming probability. To date, many data integrity checking schemes have been proposed. In this paper, we review the research progress of key cryptographic technologies of publicly verifiable data integrity checking with probable security, such as proxy data outsourcing, proxy data integrity checking, identity-based data outsourcing and several efficiency optimization technologies on computation and communication costs.

同期刊论文项目
同项目期刊论文